Mykonos Web Security 4.5.1 User Guide
Total Page:16
File Type:pdf, Size:1020Kb
Mykonos Web Security 4.5.1 User Guide Mykonos Web Security 4.5.1 User Guide This guide provides an overview of the Mykonos Web Security system, explains its functions, and includes directions for deploying and configuring the appliance for use in a network. It also outlines how to properly use the software included. Other Documentation Formats viii 1. Introduction 1 1.1. Overview ................................................................................................................................. 1 1.1.1. Summary ...................................................................................................................... 1 1.1.2. Why is it Unique as a Security Product? ........................................................................ 1 1.1.3. What Does the Software Do? ........................................................................................ 1 1.1.4. What traffic does it inspect? .......................................................................................... 2 1.1.5. How is it managed? ...................................................................................................... 2 1.2. Major Components .................................................................................................................. 2 1.3. Features ................................................................................................................................. 3 1.4. Support ................................................................................................................................... 3 2. Deployment Overview 4 2.1. Appliance Network Placement .................................................................................................. 4 2.1.1. Between Firewall and Web Servers ............................................................................... 4 2.2. Options for Load-Balanced Environments ................................................................................. 5 2.3. SSL Traffic Consideration ........................................................................................................ 5 2.4. Limitations ............................................................................................................................... 6 2.5. Hardware Requirements for Mykonos ....................................................................................... 6 3. Appliance Installation 7 3.1. Mykonos Terminology .............................................................................................................. 7 3.2. Initial Setup ............................................................................................................................. 7 3.2.1. Changing the Password ................................................................................................ 8 3.3. First Time Configuration ........................................................................................................... 8 3.4. TUI Steps ............................................................................................................................... 8 3.4.1. Network Configuration ................................................................................................... 8 3.5. Licensing ............................................................................................................................... 15 3.6. Creating a Test Configuration ................................................................................................. 16 3.6.1. Initial Configuration and Testing ................................................................................... 17 3.6.2. Larger-Scale Testing ................................................................................................... 17 4. Configuring Mykonos Web Security 18 4.1. Configuration Wizard .............................................................................................................. 18 4.1.1. Wizard: Backend Servers ............................................................................................ 19 4.1.2. Wizard: Backend Server Configuration ......................................................................... 19 4.1.3. Wizard: SMTP Servers ................................................................................................ 20 4.1.4. Wizard: Alert Service .................................................................................................. 21 4.1.5. Wizard: Backup Service .............................................................................................. 21 4.1.6. Wizard: Alerts via SNMP ............................................................................................. 22 4.1.7. Wizard: Alerts via email ............................................................................................... 23 4.1.8. Wizard: Confirmation Page .......................................................................................... 24 4.2. Verify the Installation .............................................................................................................. 25 4.3. Health Check URL ................................................................................................................. 25 4.4. What's Next? ......................................................................................................................... 25 4.5. Basic vs. Expert Configuration ................................................................................................ 26 4.5.1. Global Configuration .................................................................................................... 27 4.5.2. Services ..................................................................................................................... 28 4.5.3. Processor Configuration .............................................................................................. 28 4.5.4. Application Profiles ...................................................................................................... 29 4.6. Configuration Import / Export .................................................................................................. 31 4.7. Configuring SSL .................................................................................................................... 32 iii 4.7.1. Enabling SSL to the Client .......................................................................................... 32 4.7.2. Enabling SSL to the backend ...................................................................................... 32 4.8. Clustering .............................................................................................................................. 32 4.8.1. Node Types ................................................................................................................ 33 4.8.2. Setting up Clustering ................................................................................................... 33 4.8.3. Updating the Cluster ................................................................................................... 37 4.9. High Availability ..................................................................................................................... 37 4.9.1. Configuring HA ........................................................................................................... 38 4.9.2. Updating with HA ........................................................................................................ 41 5. Managing the Appliance 43 5.1. Restart/Shutdown .................................................................................................................. 43 5.2. System Updates .................................................................................................................... 43 5.3. System Statistics ................................................................................................................... 45 5.3.1. Master-Slave Mode ..................................................................................................... 49 5.4. Troubleshooting and Maintenance .......................................................................................... 49 5.4.1. Managing Services ...................................................................................................... 49 5.4.2. Viewing Logs .............................................................................................................. 51 5.5. Backup and Recovery ............................................................................................................ 52 5.5.1. Restoring System Configuration from Backup ............................................................... 53 5.5.2. Backing up and Restoring Console Data ...................................................................... 54 6. Processor Reference 56 6.1. Complexity Definitions ............................................................................................................ 56 6.2. Security Processors ............................................................................................................... 57 6.3. Honeypot Processors ............................................................................................................. 57 6.3.1. Access Policy Processor ............................................................................................. 57 6.3.2. Ajax Processor ..........................................................................................................